山间窄路 发表于 2025-3-28 15:22:35
http://reply.papertrans.cn/33/3202/320164/320164_41.pngFICE 发表于 2025-3-28 19:24:01
https://doi.org/10.1007/978-1-4612-4226-0ve not yet been studied sufficiently. In this paper, we analyze the security of SCHs focusing on the stream cipher function. First, we propose a model of SCHs which consist of a pre-computation function and a stream cipher. Then, we show that attacks against a stream cipher can also be threats to SCLegend 发表于 2025-3-28 23:52:18
http://reply.papertrans.cn/33/3202/320164/320164_43.pngOratory 发表于 2025-3-29 03:06:03
http://reply.papertrans.cn/33/3202/320164/320164_44.png惰性女人 发表于 2025-3-29 09:30:03
https://doi.org/10.1007/978-3-642-25206-8context-aware computing; elliptic curve cryptography; middleware; quality of services; social network seBlemish 发表于 2025-3-29 12:04:32
http://reply.papertrans.cn/33/3202/320164/320164_46.pngMARS 发表于 2025-3-29 16:16:26
Communications in Computer and Information Sciencehttp://image.papertrans.cn/f/image/320164.jpgHerpetologist 发表于 2025-3-29 21:53:06
978-3-642-25205-1Springer-Verlag GmbH Berlin Heidelberg 2012RADE 发表于 2025-3-30 02:17:04
http://reply.papertrans.cn/33/3202/320164/320164_49.png安装 发表于 2025-3-30 07:29:18
e-Business Challenges and Directions: Important Themes from the First ICE-B Workshopsiness challenges and directions across four subject areas: a) e-Business applications and models, b) enterprise engineering, c) mobility, d) business collaboration and e-Services, and e) technology platforms. Quality Function Deployment (QFD) methods were used to gather, organize and evaluate theme